With Splice there is no need to touch the actual equipment or code.
Splice overcomes device and controller vulnerabilities by building vulnerability shielding, authentication, authorisation and access controls into the network layer.
Splice logically isolates targets in an encrypted overlay network for centralised profiling, segregation and Intrusion Detection.
Splice enables sensitive real world interfacing devices to co-exist securely inside existing IT networks.
IT security practices do not always translate well for OT security or IoT security purposes. For various reasons, it may not be viable to patch vulnerabilities in HMI's and PLC's.
SPLICE provides a way to mitigate these vulnerabilities through Vulnerability Shielding by injecting authentication code into the existing communication flow. When a sensitive function is accessed, SPLICE takes over from the normal application flow and requests OTP or password verification before forwarding the request through to the HMI. Using Vulnerability Shielding, Role Based Access Control (with or without two factor authentication) can be built into legacy applications without touching the application code. Vulnerability Shielding works with both legacy and AJAX/websockets based applications.